IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security SolutionsWhite Papers (View All Report Types)
 
Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

CDW Expands BYOD Program and Trims IT Support Time with MaaS360
sponsored by IBM
WHITE PAPER: This case study explains how a leading technology solutions provider was able to leverage the right EMM solution to support and secure various BYOD devices allow for a more flexible workplace.
Posted: 12 Aug 2014 | Published: 28 Jun 2013

IBM

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: In this white paper, you'll learn the basics of how malware works and how cyber criminals use it to steal valuable data, as well as the best practices for defending your website against them.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by arcserve
WHITE PAPER: This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

arcserve

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

Rising security concern for online and mobile banking
sponsored by HID
WHITE PAPER: This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014

HID

From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by Bluebox
WHITE PAPER: This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers.
Posted: 18 Aug 2014 | Published: 31 Dec 2013

Bluebox

Security Solutions: Balancing Protection and Productivity
sponsored by BlackBerry
WHITE PAPER: In this in-depth white paper, explores security solutions that provide transparent security, integrated containerization for simply application development and deployment, and a more optimal user experience.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement